From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms., , и . IEEE Trans. Very Large Scale Integr. Syst., 27 (5): 1053-1066 (2019)Lachesis: Automated Generation of Persistent Partitionings for Big Data Applications., , , , , , и . CoRR, (2020)Benchmark of DNN Model Search at Deployment Time., , , , , и . SSDBM, стр. 10:1-10:12. ACM, (2022)Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications., и . IEEE Des. Test, 34 (4): 26-33 (2017)It's the Best Only When It Fits You Most: Finding Related Models for Serving Based on Dynamic Locality Sensitive Hashing., , , и . CoRR, (2020)Lachesis: Automated Partitioning for UDF-Centric Analytics., , , , , , и . Proc. VLDB Endow., 14 (8): 1262-1275 (2021)A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange., , , , , , и . CoRR, (2022)A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange., , , , , , и . IACR Cryptol. ePrint Arch., (2021)Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure., , , , , и . J. Hardw. Syst. Secur., 4 (4): 343-360 (2020)Serving Deep Learning Models with Deduplication from Relational Databases., , , , , , и . Proc. VLDB Endow., 15 (10): 2230-2243 (2022)